diff options
Diffstat (limited to 'usr/src/uts/common/syscall/uid.c')
-rw-r--r-- | usr/src/uts/common/syscall/uid.c | 323 |
1 files changed, 323 insertions, 0 deletions
diff --git a/usr/src/uts/common/syscall/uid.c b/usr/src/uts/common/syscall/uid.c new file mode 100644 index 0000000000..65bcabcaf0 --- /dev/null +++ b/usr/src/uts/common/syscall/uid.c @@ -0,0 +1,323 @@ +/* + * CDDL HEADER START + * + * The contents of this file are subject to the terms of the + * Common Development and Distribution License, Version 1.0 only + * (the "License"). You may not use this file except in compliance + * with the License. + * + * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE + * or http://www.opensolaris.org/os/licensing. + * See the License for the specific language governing permissions + * and limitations under the License. + * + * When distributing Covered Code, include this CDDL HEADER in each + * file and include the License file at usr/src/OPENSOLARIS.LICENSE. + * If applicable, add the following below this CDDL HEADER, with the + * fields enclosed by brackets "[]" replaced with your own identifying + * information: Portions Copyright [yyyy] [name of copyright owner] + * + * CDDL HEADER END + */ +/* + * Copyright 2004 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +/* + * Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +#include <sys/param.h> +#include <sys/types.h> +#include <sys/sysmacros.h> +#include <sys/systm.h> +#include <sys/tuneable.h> +#include <sys/cred_impl.h> +#include <sys/errno.h> +#include <sys/proc.h> +#include <sys/signal.h> +#include <sys/debug.h> +#include <sys/policy.h> +#include <sys/zone.h> + +int +setuid(uid_t uid) +{ + register proc_t *p; + int error; + int do_nocd = 0; + int uidchge = 0; + cred_t *cr, *newcr; + uid_t oldruid = uid; + zoneid_t zoneid = getzoneid(); + + if (uid < 0 || uid > MAXUID) + return (set_errno(EINVAL)); + + /* + * Need to pre-allocate the new cred structure before grabbing + * the p_crlock mutex. + */ + newcr = cralloc(); + + p = ttoproc(curthread); + +retry: + mutex_enter(&p->p_crlock); + cr = p->p_cred; + + if ((uid == cr->cr_ruid || uid == cr->cr_suid) && + secpolicy_allow_setid(cr, uid, B_TRUE) != 0) { + error = 0; + crcopy_to(cr, newcr); + p->p_cred = newcr; + newcr->cr_uid = uid; + } else if ((error = secpolicy_allow_setid(cr, uid, B_FALSE)) == 0) { + if (!uidchge && uid != cr->cr_ruid) { + /* + * The ruid of the process is going to change. In order + * to avoid a race condition involving the + * process-count associated with the newly given ruid, + * we increment the count before assigning the + * credential to the process. + * To do that, we'll have to take pidlock, so we first + * release p_crlock. + */ + mutex_exit(&p->p_crlock); + uidchge = 1; + mutex_enter(&pidlock); + upcount_inc(uid, zoneid); + mutex_exit(&pidlock); + /* + * As we released p_crlock we can't rely on the cr + * we read. So retry the whole thing. + */ + goto retry; + } + /* + * A privileged process that gives up its privilege + * must be marked to produce no core dump. + */ + if (cr->cr_uid != uid || + cr->cr_ruid != uid || + cr->cr_suid != uid) + do_nocd = 1; + oldruid = cr->cr_ruid; + crcopy_to(cr, newcr); + p->p_cred = newcr; + newcr->cr_ruid = uid; + newcr->cr_suid = uid; + newcr->cr_uid = uid; + ASSERT(uid != oldruid ? uidchge : 1); + } else + crfree(newcr); + + mutex_exit(&p->p_crlock); + + /* + * We decrement the number of processes associated with the oldruid + * to match the increment above, even if the ruid of the process + * did not change or an error occurred (oldruid == uid). + */ + if (uidchge) { + mutex_enter(&pidlock); + upcount_dec(oldruid, zoneid); + mutex_exit(&pidlock); + } + + if (error == 0) { + if (do_nocd) { + mutex_enter(&p->p_lock); + p->p_flag |= SNOCD; + mutex_exit(&p->p_lock); + } + crset(p, newcr); /* broadcast to process threads */ + return (0); + } + return (set_errno(error)); +} + +int64_t +getuid(void) +{ + rval_t r; + cred_t *cr; + + cr = curthread->t_cred; + r.r_val1 = cr->cr_ruid; + r.r_val2 = cr->cr_uid; + return (r.r_vals); +} + +int +seteuid(uid_t uid) +{ + register proc_t *p; + int error = EPERM; + int do_nocd = 0; + cred_t *cr, *newcr; + + if (uid < 0 || uid > MAXUID) + return (set_errno(EINVAL)); + + /* + * Need to pre-allocate the new cred structure before grabbing + * the p_crlock mutex. + */ + newcr = cralloc(); + p = ttoproc(curthread); + mutex_enter(&p->p_crlock); + cr = p->p_cred; + + if (uid == cr->cr_ruid || uid == cr->cr_uid || uid == cr->cr_suid || + (error = secpolicy_allow_setid(cr, uid, B_FALSE)) == 0) { + /* + * A privileged process that makes itself look like a + * set-uid process must be marked to produce no core dump, + * if the effective uid did changed. + */ + if (cr->cr_uid != uid && error == 0) + do_nocd = 1; + error = 0; + crcopy_to(cr, newcr); + p->p_cred = newcr; + newcr->cr_uid = uid; + } else + crfree(newcr); + + mutex_exit(&p->p_crlock); + + if (error == 0) { + if (do_nocd) { + mutex_enter(&p->p_lock); + p->p_flag |= SNOCD; + mutex_exit(&p->p_lock); + } + crset(p, newcr); /* broadcast to process threads */ + return (0); + } + return (set_errno(error)); +} + +/* + * Buy-back from SunOS 4.x + * + * Like setuid() and seteuid() combined -except- that non-root users + * can change cr_ruid to cr_uid, and the semantics of cr_suid are + * subtly different. + */ +int +setreuid(uid_t ruid, uid_t euid) +{ + proc_t *p; + int error = 0; + int do_nocd = 0; + int uidchge = 0; + uid_t oldruid = ruid; + cred_t *cr, *newcr; + zoneid_t zoneid = getzoneid(); + + if ((ruid != -1 && (ruid < 0 || ruid > MAXUID)) || + (euid != -1 && (euid < 0 || euid > MAXUID))) + return (set_errno(EINVAL)); + + /* + * Need to pre-allocate the new cred structure before grabbing + * the p_crlock mutex. + */ + newcr = cralloc(); + + p = ttoproc(curthread); + +retry: + mutex_enter(&p->p_crlock); + cr = p->p_cred; + + if (ruid != -1 && ruid != cr->cr_ruid && ruid != cr->cr_uid && + secpolicy_allow_setid(cr, ruid, B_FALSE) != 0) { + error = EPERM; + } else if (euid != -1 && + euid != cr->cr_ruid && euid != cr->cr_uid && + euid != cr->cr_suid && secpolicy_allow_setid(cr, euid, B_FALSE)) { + error = EPERM; + } else { + if (!uidchge && ruid != -1 && cr->cr_ruid != ruid) { + /* + * The ruid of the process is going to change. In order + * to avoid a race condition involving the + * process-count associated with the newly given ruid, + * we increment the count before assigning the + * credential to the process. + * To do that, we'll have to take pidlock, so we first + * release p_crlock. + */ + mutex_exit(&p->p_crlock); + uidchge = 1; + mutex_enter(&pidlock); + upcount_inc(ruid, zoneid); + mutex_exit(&pidlock); + /* + * As we released p_crlock we can't rely on the cr + * we read. So retry the whole thing. + */ + goto retry; + } + crhold(cr); + crcopy_to(cr, newcr); + p->p_cred = newcr; + + if (euid != -1) + newcr->cr_uid = euid; + if (ruid != -1) { + oldruid = newcr->cr_ruid; + newcr->cr_ruid = ruid; + ASSERT(ruid != oldruid ? uidchge : 1); + } + /* + * "If the real uid is being changed, or the effective uid is + * being changed to a value not equal to the real uid, the + * saved uid is set to the new effective uid." + */ + if (ruid != -1 || + (euid != -1 && newcr->cr_uid != newcr->cr_ruid)) + newcr->cr_suid = newcr->cr_uid; + /* + * A process that gives up its privilege + * must be marked to produce no core dump. + */ + if ((cr->cr_uid != newcr->cr_uid || + cr->cr_ruid != newcr->cr_ruid || + cr->cr_suid != newcr->cr_suid)) + do_nocd = 1; + + crfree(cr); + } + mutex_exit(&p->p_crlock); + + /* + * We decrement the number of processes associated with the oldruid + * to match the increment above, even if the ruid of the process + * did not change or an error occurred (oldruid == uid). + */ + if (uidchge) { + ASSERT(oldruid != -1 && ruid != -1); + mutex_enter(&pidlock); + upcount_dec(oldruid, zoneid); + mutex_exit(&pidlock); + } + + if (error == 0) { + if (do_nocd) { + mutex_enter(&p->p_lock); + p->p_flag |= SNOCD; + mutex_exit(&p->p_lock); + } + crset(p, newcr); /* broadcast to process threads */ + return (0); + } + crfree(newcr); + return (set_errno(error)); +} |